Infrastructure tutorials

Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.

linux Beginner

Configure Linux kernel parameters with sysctl for system optimization

Learn to view, modify, and persist Linux kernel parameters using sysctl for system performance tuning. Configure network, memory, and security settings safely with temporary and permanent changes.

25 min 6 distros 277 views
networking Advanced

Set up iptables high availability clustering with keepalived for automatic failover

Configure a highly available firewall cluster using iptables and keepalived with VRRP for automatic failover. Set up rule synchronization between nodes and implement monitoring for production-grade firewall redundancy.

45 min 4 distros 233 views
networking Advanced

Set up Open vSwitch 3.3 for advanced virtual machine networking with VLAN and bridge configuration

Configure Open vSwitch 3.3 to create isolated virtual networks for VMs with VLAN tagging, bridge management, and advanced traffic control. Essential for virtualization environments requiring network segmentation and high-performance VM networking.

45 min 4 distros 249 views
networking Advanced

Set up automated network topology discovery with SNMP and LLDP for infrastructure mapping

Build an automated network discovery system that uses SNMP and LLDP protocols to map your infrastructure topology, detect device relationships, and create visual network diagrams with real-time monitoring integration.

45 min 4 distros 360 views
security Intermediate

Configure Linux user and group management with sudo access control

Learn to create and manage Linux users and groups with proper sudo access control, security hardening, and monitoring. This comprehensive guide covers account creation, group membership management, sudo configuration, and security best practices for production environments.

45 min 4 distros 283 views
security Intermediate

Implement network security with iptables connection tracking and stateful packet filtering

Configure iptables with connection tracking modules to implement stateful packet filtering, advanced NAT rules, and comprehensive network security monitoring. Build robust firewall rules that track connection states and provide granular control over network traffic.

45 min 4 distros 404 views
devops Advanced

Configure Kubernetes network policies with Calico CNI for microsegmentation and security enforcement

Learn to implement advanced network security in Kubernetes using Calico CNI. Configure namespace-based microsegmentation, application-level policies, and comprehensive monitoring for enterprise-grade cluster protection.

45 min 4 distros 341 views
security Advanced

Configure advanced iptables rules for bridge network security and container isolation

Implement comprehensive bridge network security using advanced iptables rules to isolate containers, control traffic flow, and prevent lateral movement in virtualized environments.

45 min 4 distros 577 views
security Advanced

Implement Istio security policies with authorization and authentication for Kubernetes service mesh

Configure Istio service mesh security with mTLS authentication, JWT validation, and RBAC authorization policies. This tutorial covers implementing comprehensive security controls for microservices communication in production Kubernetes environments.

45 min 4 distros 399 views
networking Intermediate

Configure nftables NAT and port forwarding for home lab environments

Learn how to configure nftables for NAT and port forwarding in home lab environments. This tutorial covers basic NAT masquerading, port forwarding rules, and advanced networking scenarios for virtual machines and containers.

25 min 4 distros 827 views
security Advanced

Setup Elasticsearch 8 SSL/TLS encryption and advanced security hardening with authentication and access control

Secure your Elasticsearch 8 cluster with comprehensive SSL/TLS encryption, user authentication, role-based access control, and network hardening. This tutorial covers production-grade security configuration to protect your search infrastructure.

45 min 4 distros 591 views
networking Advanced

Configure OSPF dynamic routing with FRRouting for enterprise network failover

Set up Open Shortest Path First (OSPF) protocol using FRRouting for dynamic network routing, multi-area configurations, and automatic failover in enterprise environments.

45 min 6 distros 504 views

Need help?

Don't want to manage this yourself?

We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.

Talk to an engineer